NIST 800-171 compliance

Caller ID Spoofing

Caller ID Spoofing The Caller ID Con I received a phone call from my credit union the other day informing me that they noticed some suspicious activity on my account and wanted to confirm possible fraudulent activities.  I have a spam alert filter on my phone. Although the number from the caller did not trigger […]

Caller ID Spoofing Read More »

Phishing Attacks Part 2

Phishing Attacks: Part 2 What is Phishing? Phishing attacks use e-mail to trick users into downloading malware onto their systems for the purpose of stealing information or placing the user in a compromising position that the attacker can exploit. Malware can be ransomware, which encrypts all files until the victim pays a ransom – usually

Phishing Attacks Part 2 Read More »

Phishing Attacks Part 1

Phishing Attacks: Part 1 What is Phishing? Phishing attacks use e-mail to trick users into downloading malware onto their systems for the purpose of stealing information or placing the user in a compromising position that the attacker can exploit. Malware can be ransomware, which encrypts all files until the victim pays a ransom – usually

Phishing Attacks Part 1 Read More »

$30 Solution to Ransomware

The $30 Solution to Ransomware What is Ransomware? Ransomware is becoming the number 1 form of malware, affecting individuals and businesses alike.  In 2019, ransomware attacks are expected to climb to over 11 billion in payments and repair damages.  The typical business hit by a ransomware attack will spend about $133,000 to recover its information

$30 Solution to Ransomware Read More »

Social Engineering

Social Engineering If the “IRS” calls… The “IRS” called me last week stating that they just audited my 2017 returns and that I owed them $1627.59.  The caller indicated that I needed to make a payment quickly or the police would be coming to my house to arrest me.  The caller then asked for my

Social Engineering Read More »

Vulnerability Optimization

Vulnerability Optimization Which Fix First? I had the opportunity to oversee a cybersecurity assessment of a department of a federal agency recently.  During the assessment, the IT staff was asked, “How do you decide which vulnerabilities to fix first?” After much hesitation, the head of the IT department answered, “They try to do them all,”

Vulnerability Optimization Read More »

Small Business Cyber Risk

Small Business Cyber Risk Are You One of the 47%? Did you know that 47% of small business (companies with around 500 employees) have suffered a cyber attack last year?[i][1] Did you know that the Federal government is so concerned about small business exploitation that they now require their small business contractors to complete an

Small Business Cyber Risk Read More »

Verification Vs. Validation

Verification Vs. Validation Doing Right Things vs. Doing Things Right Today I would like to talk about verification versus validation. With respect to security, businesses are often focused on doing the right things but fail to do the things right. Equifax is an example of an organization that strategically was doing the right things but

Verification Vs. Validation Read More »